Linux Study

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

With which command switch can a user display the system time in a 24-hour format? A. %H B. %B C. %S D. %V

A. %H

A user would like to use a package manager to set up software on a Red Hat Linux system. While doing so, the user would like detailed output along with a progress bar. Which command options does the user issue? (Select all that apply.) A. -i B. -F C. -v D. -h

A. -i C. -v D. -h

A new user to the Linux operating system looks to find where the command-line utilities are saved to reference in a script. Which standard subdirectory does the user need to find? A. /bin B. /dev C. /lib D. /opt

A. /bin

A software engineer is tasked with configuring new repositories while using the Advanced Package Tool (APT) manager. In what areas are repositories exposed to APT? (Select all that Apply.) A. /etc/apt/sources.list B. /etc/apt/sources.list.d C. /etc/apt.conf D. /etc/apt/apt.conf

A. /etc/apt/sources.list B. /etc/apt/sources.list.d

Based on an organization's new cybersecurity policies, an administrator has been instructed to ensure that, by default, all new users and groups that are created fall within the specified values below. # Min/max values for automatic uid selection in useradd # UID_MIN 1000 UID_MAX 60000 # Min/max values for automatic gid selection in groupadd # GID_MIN 1000 GID_MAX 60000 To which of the following configuration files will the required changes need to be made? A. /etc/login.defs B. /etc/security/limits.conf C. /etc/default/useradd D. /etc/profile

A. /etc/login.defs

Which of the following files holds the system configuration for journal when running systemd? A. /etc/systemd/journald.conf B. /etc/systemd/systemd-journalctl.conf C. /usr/lib/systemd/journalctl.conf D. /etc/systemd/systemd-journald.conf

A. /etc/systemd/journald.conf

A seasoned Windows system administrator has recently joined the Linux administration team and wants to learn about the shell on the company's Linux hosts. As with most Linux distributions, what shell would the system administrator find as the default? A. Bash B. PowerShell C. ksh D. Zsh

A. Bash

The systemd initialization process on a Linux system experiences difficulty with a particular process. After some investigating, a system administrator notices that the unit file requires a configuration change. Which directives does the administrator modify for the process startup to fork and load any dependencies? (Select all that apply.) A. Before= B. Type= C. ExecStart= D. Requires=

A. Before= D. Requires=

A cloud engineer is installing packages during VM provisioning. Which of the following should the engineer use to accomplish this task? A. Cloud-init B. Bash C. Docker D. Sidecar

A. Cloud-init

A Linux user decides to use storage input /output (I/O) scheduling on a server. Of the different behavior types, the user configures a read first in first out (FIFO) queue and a write first in first out (FIFO) queue. Which schedule does the user implement? A. Deadline B. CFQ C. Noop D. Kernel

A. Deadline

An administrator evaluates using logical volume management (LVM) rather than a traditionally managed physical volume for the root file system. What benefits can the administrator expect when using the LVM? (Select all that apply.) A. Dynamic volume creation without rebooting B. Ability to exceed the space of a physical device C. Ability to quickly revert to a previous state D. Easy setup and configuration

A. Dynamic volume creation without rebooting B. Ability to exceed the space of a physical device C. Ability to quickly revert to a previous stat

Which of the following is a function of a bootloader? A. It initializes all the devices that are required to load the OS. B. It mounts the root filesystem that is required to load the OS. C. It helps to load the different kernels to initiate the OS startup process. D. It triggers the start of all the system services.

A. It initializes all the devices that are required to load the OS.

Which of the following technologies can be used as a central repository of Linux users and groups? A. LDAP B. MFA C. SSO D. PAM

A. LDAP

A Linux administrator reviews the output from a recently issued ls -l /dev command. Which hardware devices does the administrator identify as a character device type? (Select all that apply.) A. Mouse B. Solid-state drive C. Hard disk D. Keyboard

A. Mouse D. Keyboard

A Linux administrator would like to identify all nodes on a network with a tool that uses a Transmission Control Protocol (TCP)-connect scan and provides detailed reporting. The identification of all nodes will occur on a monthly basis via an automated script. After evaluating the options, which tool does the administrator use? A. Nmap B. Zenmap C. tcpdump D. Wireshark

A. Nmap

For what reasons is it much more common for Linux users to compile software than it is for Windows users? (Select all that apply.) A. Optimization B. Special features C. Wide distribution D. Experimental features

A. Optimization B. Special features D. Experimental features

A user creates a Bash script, but has no luck running it. Reviewing the code finds no errors. What does the user determine to be the issue? (Select all that apply.) A. Script permissions B. File extensions C. Folder permissions D. Script comments

A. Script permissions C. Folder permissions

An organization implements a new authentication scheme for all users. The scheme requires a one-time password (OTP) via a software solution on a mobile phone. What solution describes this technology the organization uses? A. Software token B. Multifactor authentication C. System Security Services Daemon D. Lightweight Directory Access Protocol (LDAP)

A. Software token

A user issues the getfacl command to view a list of access control list (ACL) entries on a directory. What metadata can the user expect to see as a result? (Select all that apply.) A. Sticky bits B. Object owner C. User identity D. Group membership

A. Sticky bits B. Object owner D. Group membership

The root administrator on a Linux system adds a user to a group using the usermod command. As a result, the user belongs to the new group but is no longer a member of other groups of which they had been a member. What does the administrator determine the problem to be? A. The administrator did not use the -a command switch. B. The administrator did not issue the command using sudo privileges. C. The administrator did not use the -G command switch. D. The user does not have the correct privileges.

A. The administrator did not use the -a command switch.

A Linux administrator needs to resolve a service that has failed to start. The administrator runs the following command: ls -1 startup file The following output is returned ---------. root root 81k Sep 13 19:01 startupfile Which of the following is MOST likely the issue? A. The service does not have permissions to read write the startupfile. B. The service startupfile size cannot be 81k. C. The service startupfile cannot be owned by root. D. The service startupfile should not be owned by the root group.

A. The service does not have permissions to read write the startupfile.

An experienced Windows systems administrator is new to managing Linux servers. The administrator needs to change some host firewall rules. How can the administrator quickly change the rules without the worry of a learning curve? A. Use UFW. B. Use iptables. C. Use nftables. D. Use firewall-cmd.

A. Use UFW.

A Linux engineer has been notified about the possible deletion of logs from the file /opt/app/logs. The engineer needs to ensure the log file can only be written into without removing previous entries. # lsattz /opt/app/logs --------------e--- logs Which of the following commands would be BEST to use to accomplish this task? A. chattr +a /opt/app/logs B. chattr +d /opt/app/logs C. chattr +i /opt/app/logs D. chattr +c /opt/app/logs

A. chattr +a /opt/app/logs

An administrator on a Linux system needs to set special permissions for a user. The permissions for the user should allow the user to have similar permissions to a file as the group owner has. Which command will the administrator utilize to accomplish this? A. chmod B. setuid C. passwd D. setgid

A. chmod

A Linux administrator created the directory /project/access2all. By creating this directory, the administrator is trying to avoid the deletion or modification of files from non-owners. Which of the following will accomplish this goal? A. chmod +t /project/access2all B. chmod +rws /project/access2all C. chmod 2770 /project/access2all D. chmod ugo+rwx /project/access2all

A. chmod +t /project/access2all

A Linux administrator wants to set the SUID of a file named dev_team.text with 744 access rights. Which of the following commands will achieve this goal? A. chmod 4744 dev_team.txt B. chmod 744 --setuid dev_team.txt C. chmod -c 744 dev_team.txt D. chmod -v 4744 --suid dev_team.txt

A. chmod 4744 dev_team.txt

A network administrator needs to set permissions on a server folder for users. A user should have read and write permissions, a developers group should have read permissions, and others should have no permissions. How might the administrator address the permissions using absolute mode? A. chmod 640 B. chmod 700 C. chmod 755 D. chmod 600

A. chmod 640

Several users reported that they were unable to write data to the /oracle1 directory. The following output has been provided: Filesystem | Size | Used | Available | Use% | Mounted on | /dev/sdb1 100G 50G 50G 50% /oracle1 Which of the following commands should the administrator use to diagnose the issue? A. df -i /oracle1 B. fdisk -1 /dev/sdb1 C. lsblk /dev/sdb1 D. du -sh /oracle1

A. df -i /oracle1

An administrator considers hardware component upgrades for a sluggish Linux server. Which command does the administrator utilize to immediately identify upgrade possibilities? A. dmidecode B. hwinfo C. lspci D. lsusb

A. dmidecode

After installing some RPM packages, a systems administrator discovers the last package that was installed was not needed. Which of the following commands can be used to remove the package? A. dnf remove packagename B. apt-get remove packagename C. rpm -i packagename D. apt remove packagename

A. dnf remove packagename

A cloud engineer needs to remove all dangling images and delete all the images that do not have an associated container. Which of the following commands will help to accomplish this task? A. docker images prune -a B. docker push images -a C. docker rmi -a images D. docker images rmi --all

A. docker images prune -a

An administrator installed an application from source into /opt/operations1/ and has received numerous reports that users are not able to access the application without having to use the full path /opt/operations1/bin/*. Which of the following commands should be used to resolve this issue? A. echo 'export PATH=$PATH:/opt/operations1/bin' >> /etc/profile B. echo 'export PATH=/opt/operations1/bin' >> /etc/profile C. echo 'export PATH=$PATH/opt/operations1/bin' >> /etc/profile D. echo 'export $PATH:/opt/operations1/bin' >> /etc/profile

A. echo 'export PATH=$PATH:/opt/operations1/bin' >> /etc/profile

Which systemctl subcommand will set a particular service to start automatically at boot time? A. enable B. start C. status D. mask

A. enable

A systems administrator pressed Ctrl+Z after starting a program using the command line, and the shell prompt was presented. In order to go back to the program, which of the following commands can the administrator use? A. fg B. su C. bg D. ed

A. fg

A Linux system fails to start and delivers the following error message: Checking all file systems. /dev/sda1 contains a file system with errors, checked forced. /dev/sda1: Inodes that were part of a corrupted orphan linked list found. /dev/sda1: UNEXPECTED INCONSISTENCY; Which of the following commands can be used to address this issue? A. fsck.ext4 /dev/sda1 B. partprobe /dev/sda1 C. fdisk /dev/sda1 D. mkfs.ext4 /dev/sda1

A. fsck.ext4 /dev/sda1

A DevOps engineer needs to download a Git repository from https://git.company.com/admin/project.git. Which of the following commands will achieve this goal? A. git clone https://git.company.com/admin/project.git B. git checkout https://git.company.com/admin/project.git C. git pull https://git.company.com/admin/project.git D. git branch https://git.company.com/admin/project.git

A. git clone https://git.company.com/admin/project.git

A user requests that a new user group be renamed from "WIP" to "Development." Which command does the administrator issue to complete this request? A. groupmod -n Development WIP B. groupdel -n WIP Development C. groupmod -n WIP Development D. groupdel -n Development WIP

A. groupmod -n Development WIP

A user is asking the systems administrator for assistance with writing a script to verify whether a file exists. Given the following: #1/bin/bash filename=$1 <CONDITIONAL> echo "FIle exists" else echo "File does not exist" fi Which of the following commands should replace the <CONDITIONAL> string? A. if [ -f "$filename" ]; then B. if [ -d "$filename" ]; then C. if [ -f "$filename" ] then D. if [ -f "$filename" ]; while

A. if [ -f "$filename" ]; then

A network engineer evaluates network performance for an organization. There is a complaint that certain servers have poor connection speeds. Which command does the engineer use on the servers to identify possible throughput bottlenecks? A. iperf B. iftop C. tracepath D. nmap

A. iperf

A user issues the luksOpen command on a storage device that contains data and has no success. What command does the user use to investigate the issue? A. isLuks B. luksFormat C. luksAddKey D. luksClose

A. isLuks

A Linux administrator was asked to run a container with the httpd server inside. This container should be exposed at port 443 of a Linux host machine while it internally listens on port 8443. Which of the following commands will accomplish this task? A. podman run -d -p 443:8443 httpd B. podman run -d -p 8443:443 httpd C. podman run -d -e 443:8443 httpd D. podman exec -p 8443:443 httpd

A. podman run -d -p 443:8443 httpd

A lead developer manages code for all local projects by syncing with a cloud-based Git repository. Occasionally other developers contribute to applications in development using the same platform. What git subcommand does the lead developer use to update a local version of an application in development? A. pull B. push C. commit D. branch

A. pull

An administrator transferred a key for SSH authentication to a home directory on a remote server. The key file was moved to .ssh/authorized_keys location in order to establish SSH connection without a password. However, the SSH command still asked for the password. Given the following output: [admin@linux ~ ]$ -ls -lhZ .ssh/auth* -rw-r--r--. admin unconfined_u:object_r:user_home_t:s0 .ssh/authorized_keys Which of the following commands would resolve the issue? A. restorecon .ssh/authorized_keys B. ssh_keygen -t rsa -o .ssh/authorized_keys C. chown root:root .ssh/authorized_keys D. chmod 600 .ssh/authorized_keys

A. restorecon .ssh/authorized_keys

An administrator accidentally deleted the /boot/vmlinuz file and must resolve the issue before the server is rebooted. Which of the following commands should the administrator use to identify the correct version of this file? A. rpm -qa | grep kernel; uname -a B. yum -y update; shutdown -r now C. cat /etc/centos-release; rpm -Uvh --nodeps D. telinit 1; restorecon -Rv /boot

A. rpm -qa | grep kernel; uname -a

A systems administrator made some changes in the ~/.bashrc file and added an alias command. When the administrator tried to use the alias command, it did not work. Which of the following should be executed FIRST? A. source ~/.bashrc B. read ~/.bashrc C. touch ~/.bashrc D. echo ~/.bashrc

A. source ~/.bashrc

A Linux administrator is tasked with adding users to the system. However, the administrator wants to ensure the users' access will be disabled once the project is over. The expiration date should be 2021-09-30. Which of the following commands will accomplish this task? A. sudo useradd -e 2021-09-30 Project_user B. sudo useradd -c 2021-09-30 Project_user C. sudo modinfo -F 2021-09-30 Project_uses D. sudo useradd -m -d 2021-09-30 Project_user

A. sudo useradd -e 2021-09-30 Project_user

A junior Linux administrator at a logistics company has a service ticket request to install a software package named mileage.rpm on a Linux host. The administrator would first like to see what dependencies they need to install before they install the package. What command will accomplish this? A. sudo yum deplist mileage.rpm B. sudo yum update mileage.rpm C. sudo dnf group install mileage D. sudo rpm -qi mileage.rpm

A. sudo yum deplist mileage.rpm

A systems administrator needs to check if the service systemd-resolved.service is running without any errors. Which of the following commands will show this information? A. systemctl status systemd-resolved.service B. systemctl enable systemd-resolved.service C. systemctl mask systemd-resolved.service D. systemctl show systemd-resolved.service

A. systemctl status systemd-resolved.service

An organization hires a consultant to investigate network issues within a warehouse. There is a complaint that it takes a very long time when trying to open or save files to a server located in the main office. The consultant determines that an indirect path exists between the warehouse and the main office. Which command provides this information to the consultant? A. traceroute B. iperf C. resolvectl D. nmap

A. traceroute

A systems administrator wants to be sure the sudo rules just added to /etc/sudoers are valid. Which of the following commands can be used for this task? A. visudo -c B. test -f /etc/sudoers C. sudo vi check D. cat /etc/sudoers | tee test

A. visudo -c

A systems administrator received a notification that a system is performing slowly. When running the top command, the systems administrator can see the following values: %Cpu (s) : 2.7 us, 1.9 sy, 0.0 ni, 0.4 id, 95 wa, 0.0 hi, 0.0 si 0.0 st Which of the following commands will the administrator most likely run NEXT? A. vmstat B. strace C. htop D. lsof

A. vmstat

A Linux user would like to use the terminal to recursively download a file that is available on a public server. Which command does the user utilize? A. wget B. curl C. apt D. yum

A. wget

A Linux administrator is working on a script to perform an automation task to clean up specific files in a user's personal directory. What alias can the administrator use in place of the directory path for this folder for any user? A. $ETC B. $HOME C. $ROOT D. $BIN

B. $HOME

A Linux computer user troubleshoots a workstation by issuing the top command. What does the user look for within the command's output to identify kernel processor time? A. %us B. %s C. %id D. %st

B. %s

A user looks to view the compression state of compressed files to save disk space. What command option does the user issue when using the GNU zip utility? A. -d B. -v C. -t D. -f

B. -v

A Linux system administrator needs to find the password expiration information for all system users. Which file does the administrator review to accomplish this? A. /etc/passwd B. /etc/shadow C. /etc/bashrc D. /etc/profile

B. /etc/shadow

A user creates a script on a Linux system. Which operator does the user use when requiring standard output to redirect to a new file? A. >> B. > C. 2> D. 2>>

B. >

An administrator configures a network with a 172.16.0.0 subnet. On which class of address does the network operate? A. A B. B C. C D. D

B. B

An engineer utilizes an orchestration utility that requires an agent for the target systems, accepts commands only from a Domain Specific Language (DSL) based on Ruby, and lacks push functionality. Which utility is in use? A. Ansible B. Chef C. Puppet D. Terraform

B. Chef

A systems administrator is implementing a new service task with systems at startup and needs to execute a script entitled test.sh with the following content: TIMESTAMP=$ (date '+%Y-%m-%d %H:%M:%S') echo "helpme.service: timestamp $(Timestamp)" | system-cat -p info sleep 60 done The administrator tries to run the script after making it executable with chmod +x; however, the script will not run. Which of the following should the administrator do to address this issue? (Choose two.) A. Add #!/bin/bash to the bottom of the script. B. Create a unit file for the new service in /etc/systemd/system/ with the name helpme.service in the location. C. Add #!/bin/bash to the top of the script. D. Restart the computer to enable the new service. E. Create a unit file for the new service in /etc/init.d with the name helpme.service in the location. F. Shut down the computer to enable the new service.

B. Create a unit file for the new service in /etc/systemd/system/ with the name helpme.service in the location. C. Add #!/bin/bash to the top of the script.

An administrator believes that user storage quotas are set on a Linux system. Running a disk quota report produces no results. What action should the administrator take to verify user quotas are configured? A. Open the usrquota utility. B. Edit the /etc/fstab file. C. Open the grpquota utility. D. Check the inode quota usage.

B. Edit the /etc/fstab file.

A Linux system is failing to boot with the following error: error: no such partitions Entering rescue mode... grub rescue> Which of the following actions will resolve this issue? (Choose two.) A. Execute grub-install --root-directory=/mnt and reboot. B. Execute grub-install /dev/sdX and reboot. C. Interrupt the boot process in the GRUB menu and add rescue to the kernel line. D. Fix the partition modifying /etc/default/grub and reboot. E. Interrupt the boot process in the GRUB menu and add single to the kernel line. F. Boot the system on a LiveCD/ISO.

B. Execute grub-install /dev/sdX and reboot. F. Boot the system on a LiveCD/ISO.

A Linux administrator hardens a server by implementing best practice settings. Which setting does the administrator adjust to achieve the principle of least privilege? A. System logging B. Host firewall C. Security scans D. Secure boot

B. Host firewall

A security engineer recommends the use of firewalls for servers spread throughout an organization's network implementation. To fulfill the engineer's requirements, only the service that the server provides should be allowed to pass through the firewall. What approach does the engineer use when configuring the firewall? A. Perimeter network-based B. Host-based C. Hardware-based D. Segment-based

B. Host-based

A Linux admin is troubleshooting an issue in which an application service failed to start on a Linux server. The admin runs a few commands and gets the following outputs: Output 1: Dec 23 23:14:15 root systemd[1] logsearch.service: Failed to start Logsearch. Output 2: logsearch.service - Log Search Loaded: loaded (/etc/systemd/system/logsearch.service; enabled; vendor present:enabled) Active: failed (Result: timeout) Process: 3267 ExecStart=/usr/share/logsearch/bin/logger ... Main PID: 3267 (code=killed, signal=KILL) Which of the following is the MOST likely action the admin should take to resolve this issue? A. Enable the logsearch.service and restart the service. B. Increase the TimeoutStartUSec configuration for the logsearch.sevice. C. Update the OnCalendar configuration to schedule the start of the logsearch.service. D. Update the KillSignal configuration for the logsearch.service to use TERM.

B. Increase the TimeoutStartUSec configuration for the logsearch.sevice.

A user would like to review metadata on a file, such as file time stamps. What does the user utilize to obtain this information? A. Absolute path B. Index node C. File link D. Relative path

B. Index node

A Linux server is low on physical memory. An administrator attempts to reduce the low memory problem by configuring swap space for large applications. Which swap space type does the administrator utilize when storage partitions already exist? A. Device B. Pseudo C. File system D. Virtual

B. Pseudo

A Linux administrator manages several containers on a Linux server. When managing the images, the administrator uses the pull and push commands in which context? A. Persistent storage B. Registries C. Networking D. Orchestration

B. Registries

To harden one of the servers, an administrator needs to remove the possibility of remote administrative login via the SSH service. Which of the following should the administrator do? A. Add the line DenyUsers root to the /etc/hosts.deny file. B. Set PermitRootLogin to no in the /etc/ssh/sshd_config file. C. Add the line account required pam_nologin. so to the /etc/pam.d/sshd file. D. Set PubKeyAuthentication to no in the /etc/ssh/ssh_config file.

B. Set PermitRootLogin to no in the /etc/ssh/sshd_config file.

A system administrator enables a recently disabled service on a Linux server. When the system administrator tries to use a related feature on the server, an error message appears. What action does the administrator take with the service to remedy the problem? A. Restart B. Start C. Status D. Mask

B. Start

A systems administrator is receiving tickets from users who cannot reach the application app that should be listening on port 9443/tcp on a Linux server.To troubleshoot the issue, the systems administrator runs netstat and receives the following output: # netstat -anp | grep appd | grep -w LISTEN tcp 0 0 127.0.0.1:9443 0.0.0.0:* LISTEN 1234/appd Based on the information above, which of the following is causing the issue? A. The IP address 0.0.0.0 is not valid. B. The application is listening on the loopback interface. C. The application is listening on port 1234. D. The application is not running.

B. The application is listening on the loopback interface.

A server administrator modifies the GNU GRand Unified Bootloader (GRUB2) on a Linux server by creating a new grub.cfg file. The server contains only one operating system on a UEFI system. Now the system does not boot properly. What does the administrator conclude the issue could be? (Select all that apply.) A. The grub2-mkconfig command was used. B. The file was created with a text editor. C. The file was saved in the wrong folder. D. The boot menu was misconfigured.

B. The file was created with a text editor. C. The file was saved in the wrong folder.

A newly installed Linux system at an organization cannot be seen by other systems on the network by name. The administrator discovers that the new system has a naming conflict. What approach does the administrator use to remedy this issue? A. Enter the host record in DNS. B. Use the hostnamectl command. C. Use the hostname command. D. Delete the host record in DNS.

B. Use the hostnamectl command.

A user utilizes a script to search for certain values in a file. The user would like to use results as content for a second file. How can the user accomplish this while using grep? A. Use an absolute path with the command. B. Use the pipe character with the command. C. Use a relative path with the command. D. Use the -i option with the command.

B. Use the pipe character with the command.

A Linux user would like to test software in an isolated environment. A prerequisite is that any secure boundaries should be managed by the file system. Which method does the user decide to use? A. Sandbox B. chroot C. Snaps D. Flatpak

B. chroot

A user would like to add the week of the year information within a script file that parses information for new files added to a specific folder on the system. Which command does the user consider for use in the script? A. date /etc/localtime B. date +%V C. set-time %A D. timedatectl -M

B. date +%V

A Linux administrator needs to create an image named sda.img from the sda disk and store it in the /tmp directory. Which of the following commands should be used to accomplish this task? A. dd of=/dev/sda if=/tmp/sda.img B. dd if=/dev/sda of=/tmp/sda.img C. dd --if=/dev/sda --of=/tmp/sda.img D. dd --of=/dev/sda --if=/tmp/sda.img

B. dd if=/dev/sda of=/tmp/sda.img

A Linux administrator is alerted to a storage capacity issue on a server without a specific mount point or directory. Which of the following commands would be MOST helpful for troubleshooting? (Choose two.) A. parted B. df C. mount D. du E. fdisk F. dd G. ls

B. df D. du

A Linux engineer set up two local DNS servers (10.10.10.10 and 10.10.10.20) and was testing email connectivity to the local mail server using the mail command on a local machine when the following error appeared: Send-mail: Cannot open mail:25 The local machine DNS settings are: $ cat /etc/resolv.conf nameserver 10.10.10.10 #web records nameserver 10.10.10.20 #email records Mail server: mail.example.com Which of the following commands could the engineer use to query the DNS server to get mail server information? A. dig @example.com 10.10.10.20 a B. dig @10.10.10.20 example.com mx C. dig @example.com 10.10.10.20 ptr D. dig @10.10.10.20 example.com ns

B. dig @10.10.10.20 example.com mx

A cloud engineer is asked to copy the file deployment.yaml from a container to the host where the container is running. Which of the following commands can accomplish this task? A. docker cp container_id/deployment.yaml deployment.yaml B. docker cp container_id:/deployment.yaml deployment.yaml C. docker cp deployment.yaml local://deployment.yaml D. docker cp container_id/deployment.yaml local://deployment.yaml

B. docker cp container_id:/deployment.yaml deployment.yaml

A Linux administrator needs to ensure that Java 7 and Java 8 are both locally available for developers to use when deploying containers. Currently only Java 8 is available. Which of the following commands should the administrator run to ensure both versions are available? A. docker image load java:7 B. docker image pull java:7 C. docker image import java:7 D. docker image build java:7

B. docker image pull java:7

A new file was added to a main Git repository. An administrator wants to synchronize a local copy with the contents of the main repository. Which of the following commands should the administrator use for this task? A. git reflog B. git pull C. git status D. git push

B. git pull

A systems administrator is tasked with installing GRUB on the legacy MBR of the SATA hard drive. Which of the following commands will help the administrator accomplish this task? A. grub-install /dev/hda B. grub-install /dev/sda C. grub-install /dev/sr0 D. grub-install /dev/hd0,0

B. grub-install /dev/sda

A cloud engineer needs to block the IP address 192.168.10.50 from accessing a Linux server. Which of the following commands will achieve this goal? A. iptables -F INPUT -j 192.168.10.50 -m DROP B. iptables -A INPUT -s 192.168.10.30 -j DROP C. iptables -i INPUT --ipv4 192.168.10.50 -z DROP D. iptables -j INPUT 192.168.10.50 -p DROP

B. iptables -A INPUT -s 192.168.10.30 -j DROP

A DevOps engineer needs to allow incoming traffic to ports in the range of 4000 to 5000 on a Linux server. Which of the following commands will enforce this rule? A. iptables -f filter -I INPUT -p tcp --dport 4000:5000 -A ACCEPT B. iptables -t filter -A INPUT -p tcp --dport 4000:5000 -j ACCEPT C. iptables filter -A INPUT -p tcp --dport 4000:5000 -D ACCEPT D. iptables filter -S INPUT -p tcp --dport 4000:5000 -A ACCEPT

B. iptables -t filter -A INPUT -p tcp --dport 4000:5000 -j ACCEPT

A systems administrator installed a new software program on a Linux server. When the systems administrator tries to run the program, the following message appears on the screen. Hardware virtulization support is not available on this system. Either is not present or disabled in the system's BIOS Which of the following commands will allow the systems administrator to check whether the system supports virtualization? A. dmidecode -s system-version B. lscpu C. sysctl -a D. cat /sys/device/system/cpu/possible

B. lscpu

A Linux systems administrator is configuring a new filesystem that needs the capability to be mounted persistently across reboots. Which of the following commands will accomplish this task? (Choose two.) A. df -h /data B. mkfs.ext4 /dev/sdc1 C. fsck /dev/sdc1 D. fdisk -l /dev/sdc1 E. echo "/data /dev/sdc1 ext4 defaults 0 0" >> /etc/fstab F. echo "/dev/sdc1 /data ext4 defaults 0 0" >> /etc/fstab

B. mkfs.ext4 /dev/sdc1 F. echo "/dev/sdc1 /data ext4 defaults 0 0" >> /etc/fstab

A junior administrator is trying to set up a passwordless SSH connection to one of the servers. The administrator follows the instructions and puts the key in the authorized_key file at the server, but the administrator is still asked to provide a password during the connection.Given the following output: junior@server:-$ ls -lh .ssh/auth* -rw------ 1 junior junior 566 sep 13 20:56 .ssh/authorized_key Which of the following commands would resolve the issue and allow an SSH connection to be established without a password? A. restorecon -rv .ssh/authorized_key B. mv .ssh/authorized_key .ssh/authorized_keys C. systemctl restart sshd.service D. chmod 600 mv .ssh/authorized_key

B. mv .ssh/authorized_key .ssh/authorized_keys

A Linux administrator needs to analyze a failing application that is running inside a container. Which of the following commands allows the Linux administrator to enter the running container and analyze the logs that are stored inside? A. docker run -ti app /bin/sh B. podman exec -ti app /bin/sh C. podman run -d app /bin/bash D. docker exec -d app /bin/bash

B. podman exec -ti app /bin/sh

An administrator deployed a Linux server that is running a web application on port 6379/tcp. SELinux is in enforcing mode based on organization policies. The port is open on the firewall. Users who are trying to connect to a local instance of the web application receive Error 13, Permission denied. The administrator ran some commands that resulted in the following output: # semange port -1 | egrep '(^http_port_t | 6379)' http_port_t tcp 80 , 81, 443, 488, 8008, 8009, 8443, 9000 # curl http://localhost/App.php Cannot connect to App Server. Which of the following commands should be used to resolve the issue? A. semanage port -d -t http_port_t -p tcp 6379 B. semanage port -a -t http_port_t -p tcp 6379 C. semanage port -a http_port_t -p top 6379 D. semanage port -l -t http_port_tcp 6379

B. semanage port -a -t http_port_t -p tcp 6379

A network administrator troubleshoots firewall permissions. Somehow, unallowed ports on a server are available for connection by remote hosts. Which commands does the administrator consider useful to display listening and non-listening ports on the server? (Select all that apply.) A. lsof B. ss C. netstat D. tracepath

B. ss C. netstat

A Linux systems administrator would like to maintain permissions for users that include write and execute. However, the administrator needs to protect any files from deletion. What does the administrator determine to be the solution? A. set user ID B. sticky bit C. set group ID D. passwd

B. sticky bit

A Linux technician is unable to close the nano text editor on their station. A process seems to be stuck, not allowing nano to exit gracefully. The technician has run the top command and identified the PID as 75. What command can the technician enter to force close the unresponsive process? A. sudo kill -15 75 B. sudo kill -9 75 C. sudo kill -1 75 D. sudo kill -17 75

B. sudo kill -9 75

Which command will install the software package myapp.rpm and provide a detailed output of the installation process along with a progress bar? A. sudo rpm -iv myapp.rpm B. sudo rpm -ivh myapp.rpm C. sudo rpm -i myapp.rpm D. sudo rpm -evh myapp.rpm

B. sudo rpm -ivh myapp.rpm

A systems administrator needs to reconfigure a Linux server to allow persistent IPv4 packet forwarding. Which of the following commands is the correct way to accomplish this task? A. echo 1 > /proc/sys/net/ipv4/ipv_forward B. sysctl -w net.ipv4.ip_forward=1 C. firewall-cmd --enable ipv4_forwarding D. systemctl start ipv4_forwarding

B. sysctl -w net.ipv4.ip_forward=1

A junior Linux administrator is tasked with installing an application. The installation guide states the application should only be installed in a run level 5 environment. $ systemctl get-default getty.target Which of the following commands would ensure the server is set to runlevel 5? A. systemctl isolate multi-user.target B. systemctl isolate graphical.target C. systemctl isolate network.target D. systemctl isolate basic.target

B. systemctl isolate graphical.target

A systems administrator is checking the system logs. The administrator wants to look at the last 20 lines of a log. Which of the following will execute the command? A. tail -v 20 B. tail -n 20 C. tail -c 20 D. tail -l 20

B. tail -n 20

A project folder exists on a Linux server. Several users mention that access to the folder is not working properly. If the administrator uses the setfacl command to remove all ACL entries but leaves standard permissions in place, which command switch does the administrator issue? A. -R B. -m C. -b D. -x

C. -b

A developer compiles software on a Linux system. Something is not working correctly, and the developer potentially missed a step. Which command does the developer use prior to using the make command to create any binaries? A. make install B. tar C. ./configure D. gzip

C. ./configure

An administrator executes the ls -l command on the /dev directory on a Linux system to check for error messages. Which device file should the administrator examine? A. /dev/ B. /dev/zero C. /dev/null D. /dev/urandom

C. /dev/null

A Linux administrator created a new file system. Which of the following files must be updated to ensure the filesystem mounts at boot time? A. /etc/sysctl B. /etc/filesystems C. /etc/fstab D. /etc/nfsmount.conf

C. /etc/fstab

A systems administrator troubleshoots a problem on a Linux system. The issue is that a new user does not belong to a group as intended. The administrator verifies any associated IDs by viewing which files? (Select all that apply.) A. /etc/shadow B. /etc/profile C. /etc/group D. /etc/passwd

C. /etc/group D. /etc/passwd

A Linux network engineer has received a service ticket to allow Network Time Protocol traffic into a secured DMZ. What port will they need to open to allow this traffic to flow through? A. 443 B. 22 C. 123 D. 25

C. 123

A user troubleshoots a Linux system that does not boot properly. The issue appears to be with drive sectors that do not load properly. The user investigates which part of the boot process? A. UEFI B. Boot sector C. Boot loader D. Secondary boot loader

C. Boot loader

The company has asked an Apache web developer to change the configuration of a development server so that when users access the internal site, they pull up documents from a testing folder, rather than the default location /var/www/html. What directive of the httpd.conf file will point connections to this testing folder? A. Listen B. ServerName C. DocumentRoot D. AccessFileName

C. DocumentRoot

A user requires that fields in a text file are sorted in a particular manner. The user issues the sort command with the -k option. How does this option impact the sort command results? A. Fields are separated. B. String numerical values are used. C. Field location values are used. D. The content is in descending order.

C. Field location values are used.

A user would like to have a file name in one directory point to a file in another. How does an administrator accomplish this? A. Absolute path B. Relative path C. File link D. Index node

C. File link

A Linux system is failing to start due to issues with several critical system processes. Which of the following options can be used to boot the system into the single user mode? (Choose two.) A. Execute the following command from the GRUB rescue shell: mount -o remount, ro/sysroot. B. Interrupt the boot process in the GRUB menu and add systemd.unit=single in the kernel line. C. Interrupt the boot process in the GRUB menu and add systemd.unit=rescue.target in the kernel line. D. Interrupt the boot process in the GRUB menu and add single=user in the kernel line. E. Interrupt the boot process in the GRUB menu and add init=/bin/bash in the kernel line. F. Interrupt the boot process in the GRUB menu and add systemd.unit=single.target in the kernel line.

C. Interrupt the boot process in the GRUB menu and add systemd.unit=rescue.target in the kernel line. E. Interrupt the boot process in the GRUB menu and add init=/bin/bash in the kernel line.

Which of the following tools is commonly used for creating CI/CD pipelines? A. Chef B. Puppet C. Jenkins D. Ansible

C. Jenkins

A Linux system experiences a sudden issue in which the root file system cannot be found. What results from this issue? A. Blue screen B. Failed hardware C. Kernel panic D. Low virtual memory

C. Kernel panic

An administrator determines that the systemd program is not loading properly when a system boots. What likely results when the program does not load? A. Blue screen B. Missing file system C. Kernel panic D. Low virtual memory

C. Kernel panic

A Linux administrator manages several containers for developer access. The containers vary in their configuration. For network access, some utilize network address translation. Which network drivers would require this type of implementation? (Select all that apply.) A. None B. Host C. Overlay D. Bridge

C. Overlay D. Bridge

A systems administrator configures a Linux system for remote access via Secure Shell (SSH) by using key-based credentials. The administrator properly configures the /etc/ssh/sshd_config file, but the connection does not work as intended. What step does the administrator need to take? A. Set the property PasswordAuthentication no. B. Set the property PublicKeyAuthentication yes. C. Restart the sshd process. D. Assign the default port to 2222.

C. Restart the sshd process.

A new mobile application development company is working on a new project that requires extremely fast storage speeds and large capacity. Which storage interface should the company be looking at implementing? A. SATA B. SSD C. SAS D. SCSI

C. SAS

A systems administrator configures the use of certificates on a server. The certificate uses a direct trust and protects a web-based application. Which certificate does the administrator utilize? A. Wildcard B. Certificate authority C. Self-signed D. Public key infrastructure

C. Self-signed

Users report that connections to a MariaDB service are being closed unexpectedly. A systems administrator troubleshoots the issue and finds the following message in /var/log/messages: dbserver kernel: out of Memory: Killed process 1234 (mysqld). Which of the following is causing the connection issue? A. The process mysqld is using too many semaphores. B. The server is running out of file descriptors. C. Something is starving the server resources. D. The amount of RAM allocated to the server is too high.

C. Something is starving the server resources.

A Linux administrator would like to use systemd to schedule a job to run every two hours. The administrator creates timer and service definitions and restarts the server to load these new configurations. After the restart, the administrator checks the log file and notices that the job is only running daily. Which of the following is MOST likely causing the issue? A. The checkdiskspace.service is not running. B. The checkdiskspace.service needs to be enabled. C. The OnCalendar schedule is incorrect in the timer definition. D. The system-daemon services need to be reloaded.

C. The OnCalendar schedule is incorrect in the timer definition.

A Linux administrator booted up the server and was presented with a non-GUI terminal. The administrator ran the command systemctl isolate graphical.target and rebooted the system by running systemctl reboot, which fixed the issue. However, the next day the administrator was presented again with a non-GUI terminal. Which of the following is the issue? A. The administrator did not reboot the server properly. B. The administrator did not set the default target to basic.target. C. The administrator did not set the default target to graphical.target. D. The administrator did not shut down the server properly.

C. The administrator did not set the default target to graphical.target.

A Linux admin is scheduling a system job that runs a script to check available disk space every hour. The Linux admin does not want users to be able to start the job. Given the following: [Unit] Description=Check available disk space RefuseManualstart=yes RefuseManualStop=yes [Timer] Persistent=true OnCalender=*-*-*-*:00:00 Unit=checkdiskspace.service [Install] WantedBy=timers.target The Linux administrator attempts to start the timer service but receives the following error message: Failed to start checkdiskspace.timer: Operation refused ... Which of the following is MOST likely the reason the timer will not start? A. The checkdiskspace.timer unit should be enabled via systemctl. B. The timers.target should be reloaded to get the new configuration. C. The checkdiskspace.timer should be configured to allow manual starts. D. The checkdiskspace.timer should be started using the sudo command.

C. The checkdiskspace.timer should be configured to allow manual starts.

A Linux user tends to use multiple text editors across different distributions. Moments ago, the user saved and exited from editing a text file by using the ZZ keystrokes. Which editor did the user utilize? A. Nano B. Gedit C. Vim D. gVim

C. Vim

A developer has been unable to remove a particular data folder that a team no longer uses. The developer escalated the issue to the systems administrator. The following output was received: # rmdir data/ rmdir: failed to remove 'data/': Operation not permitted # rm -rf data/ rm: cannot remove 'data': Operation not permitted # mv data/ mydata mv: cannot move 'data/' to 'mydata': Operation not permitted # cd data/ # cat > test.txt bash: test.txt: Permission denied Which of the following commands can be used to resolve this issue? A. chgrp -R 755 data/ B. chmod -R 777 data/ C. chattr -R -i data/ D. chown -R data/

C. chattr -R -i data/

A systems administrator needs to clone the partition /dev/sdc1 to /dev/sdd1. Which of the following commands will accomplish this task? A. tar -cvzf /dev/sdd1 /dev/sdc1 B. rsync /dev/sdc1 /dev/sdd1 C. dd if=/dev/sdc1 of=/dev/sdd1 D. scp /dev/sdc1 /dev/sdd1

C. dd if=/dev/sdc1 of=/dev/sdd1

A systems administrator requires that all files that are created by the user named web have read-only permissions by the owner. Which of the following commands will satisfy this requirement? A. chown web:web /home/web B. chmod -R 400 /home/web C. echo "umask 377" >> /home/web/.bashrc D. setfacl read /home/web

C. echo "umask 377" >> /home/web/.bashrc

An administrator creates a shell script. The goal of the script is to update a database by running several commands. When the user runs the script, returning to the parent process should not happen. Which command does the administrator utilize with the script? A. source B. read C. exec D. echo

C. exec

Due to low disk space, a Linux administrator finding and removing all log files that were modified more than 180 days ago. Which of the following commands will accomplish this task? A. find /var/log -type d -mtime +180 -print -exec rm {} \; B. find /var/log -type f -modified +180 -rm C. find /var/log -type f -mtime +180 -exec rm {} \; D. find /var/log -type c -atime +180 -remove

C. find /var/log -type f -mtime +180 -exec rm {} \;

A systems administrator created a web server for the company and is required to add a tag for the API so end users can connect. Which of the following would the administrator do to complete this requirement? A. hostnamectl status --no-ask-password B. hostnamectl set-hostname "$(perl -le "print" "A" x 86)" C. hostnamectl set-hostname Comptia-WebNode -H [email protected] D. hostnamectl set-hostname Comptia-WebNode --transient

C. hostnamectl set-hostname Comptia-WebNode -H [email protected]

A Linux administrator needs to create a new cloud.cpio archive containing all the files from the current directory. Which of the following commands can help to accomplish this task? A. ls | cpio -iv > cloud.epio B. ls | cpio -iv < cloud.epio C. ls | cpio -ov > cloud.cpio D. ls cpio -ov < cloud.cpio

C. ls | cpio -ov > cloud.cpio

An administrator looks into optimizing a Linux system by unloading unnecessary kernel modules. To do so, which command does the administrator use to see which modules are currently loaded? A. modinfo B. insmod C. lsmod D. modprobe

C. lsmod

A systems administrator wants to back up the directory /data and all its contents to /backup/data on a remote server named remote. Which of the following commands will achieve the desired effect? A. scp -p /data remote:/backup/data B. ssh -i /remote:/backup/ /data C. rsync -a /data remote:/backup/ D. cp -r /data /remote/backup/

C. rsync -a /data remote:/backup/

A development team asks an engineer to guarantee the persistency of journal log files across system reboots. Which of the following commands would accomplish this task? A. grep -i auto /etc/systemd/journald.conf && systemctl restart systemd-journald.service B. cat /etc/systemd/journald.conf | awk '(print $1,$3)' C. sed -i 's/auto/persistent/g' /etc/systemd/journald.conf && sed -i 'persistent/s/ˆ#//q' /etc/systemd/journald.conf D. journalctl --list-boots && systemctl restart systemd-journald.service

C. sed -i 's/auto/persistent/g' /etc/systemd/journald.conf && sed -i 'persistent/s/ˆ#//q' /etc/systemd/journald.conf

A user on a Linux system attempts to run a command as a privileged user for a specific command. After evaluating command options, which command does the user utilize? A. su B. visudo C. sudo D. su root

C. sudo

A Linux administrator is creating a primary partition on the replacement hard drive for an application server. Which of the following commands should the administrator issue to verify the device name of this partition? A. sudo fdisk /dev/sda B. sudo fdisk -s /dev/sda C. sudo fdisk -l D. sudo fdisk -h

C. sudo fdisk -l

A systems administrator has been tasked with disabling the nginx service from the environment to prevent it from being automatically and manually started. Which of the following commands will accomplish this task? A. systemctl cancel nginx B. systemctl disable nginx C. systemctl mask nginx D. systemctl stop nginx

C. systemctl mask nginx

Which of the following commands will display the operating system? A. uname -n B. uname -s C. uname -o D. uname -m

C. uname -o

A developer is trying to install an application remotely that requires a graphical interface for installation. The developer requested assistance to set up the necessary environment variables along with X11 forwarding in SSH. Which of the following environment variables must be set in remote shell in order to launch the graphical interface? A. $RHOST B. SETENV C. $SHELL D. $DISPLAY

D. $DISPLAY

A cloud engineer needs to change the secure remote login port from 22 to 49000. Which of the following files should the engineer modify to change the port number to the desired value? A. /etc/host.conf B. /etc/hostname C. /etc/services D. /etc/ssh/sshd_config

D. /etc/ssh/sshd_config

A problematic Red Hat-derived Linux system requires investigating. The issue is a potential system breach. With which log can an administrator determine if there are any failed login attempts? A. /var/log/syslog B. /var/log/messages C. /var/log/auth.log D. /var/log/secure

D. /var/log/secure

A Linux administrator attempts to create a custom container from scratch. The administrator decides to use Docker as a solution. Which step does the administrator perform first? A. Start the container. B. Create a container. C. Create an image. D. Create a configuration file.

D. Create a configuration file.

An organization needs to upgrade a server farm with a new virtual machine configuration. The administrators manage the configuration centrally. The tool that the administrators utilize defines the settings from a desired configuration in which mode? A. Iterative B. Bootstrapping C. Lifecycle D. Declarative

D. Declarative

A Linux user would like to add a virtual file system to a Linux workstation. Which storage type directly supports this feature? A. MBR B. GPT C. GUID D. FUSE

D. FUSE

A Linux administrator is tasked with creating resources using containerization. When deciding how to create this type of deployment, the administrator identifies some key features, including portability, high availability, and scalability in production. Which of the following should the Linux administrator choose for the new design? A. Docker B. On-premises systems C. Cloud-based systems D. Kubernetes

D. Kubernetes

A systems administrator is troubleshooting a connectivity issue pertaining to access to a system named db.example.com. The system IP address should be 192.168.20.88. The administrator issues the dig command and receives the following output: ;; ANSWER SECTION: db.example.com. 15 IN A 192.168.20.89 The administrator runs grep db.example.com /etc/hosts and receives the following output: 192.168.20.89 db.example.com Given this scenario, which of the following should the administrator do to address this issue? A. Modify the /etc/hosts file and change the db.example.com entry to 192.168.20.89. B. Modify the /etc/network file and change the db.example.com entry to 192.168.20.88. C. Modify the /etc/network file and change the db.example.com entry to 192.168.20.89. D. Modify the /etc/hosts file and change the db.example.com entry to 192.168.20.88.

D. Modify the /etc/hosts file and change the db.example.com entry to 192.168.20.88.

A Linux admin has installed a web server, a database server, and a web application on a server. The web app should be active in order to render the web pages. After the admin restarts the server, the website displays the following message in the browser: Error establishing a database connection. The Linux admin reviews the following relevant output from the systemd init files: [Unit] Description=The Apache #HTTP Server Wants=httpd-init.service After=network.target remote-fs.target nss-lookup-target httpd-init.service mariadb.service [Unit] Description=MariaDB 10.5 database server After=network.target The admin needs to ensure that the database is available before the web application is started. Which of the following should the admin add to the HTTP server .service file to accomplish this task? A. TRIGGERS=mariadb.service B. ONFAILURE=mariadb.service C. WANTEDBY=mariadb.service D. REQUIRES=mariadb.service

D. REQUIRES=mariadb.service

A security engineer recommends the use of a physical firewall in an organization's network implementation. To fulfill the organization's requirements, multiple subnets should not be allowed to communicate with each other. What approach does the engineer use when configuring the firewall? A. Host-based B. Perimeter network-based C. Software-based D. Segment-based

D. Segment-based

Which of the following technologies provides load balancing, encryption, and observability in containerized environments? A. Virtual private network B. Sidecar pod C. Overlay network D. Service mesh

D. Service mesh

Which script component would a user use when requiring that a declared variable has a single fixed value? A. Function B. Escape characters C. Array D. String literal

D. String literal

An administrator would like to review the configuration for any network functionality that is part of a Linux system's startup. Which systemd unit file does the administrator determine holds the configuration? A. Mount B. Service C. Timer D. Target

D. Target

A systems administrator is deploying three identical, cloud-based servers. The administrator is using the following code to complete the task: resource "abc_instance" "ec2_instance" { ami = data.abc_ami.vendor-Linux-2.id associate_public_ip_address = true count = 3 instance_type = "instance_type" vpc_security_group_ids = [abc.security_group.allow_ssh.id] key_name = abc_key_pair.key_pair.key_name tags = { Name = "${var.namespace} ${count.index) " } } Which of the following technologies is the administrator using? A. Ansible B. Puppet C. Chef D. Terraform

D. Terraform

A user reviews a text file. The user issues the sort command with the -r option. How does this option impact the sort command results? A. Field location values are used. B. String numerical values are used. C. Fields are separated. D. The content is in descending order.

D. The content is in descending order.

A systems administrator configured firewall rules using firewalld. However, after the system is rebooted, the firewall rules are not present: Chain INPUT (policy ACCEPT) target prot opt source destination Chain FORWARD (policy ACCEPT) target prot opt source destination Chain OUTPUT (policy ACCEPT) target prot opt source destination The systems administrator makes additional checks: - dynamic firewall daemon Loaded: loaded (/usr/lib/systemd/system/firewalld.service: disabled; vendor preset: enabled) Active: inactive (dead) Docs: man: firewalld (1) firewalld is not running Which of the following is the reason the firewall rules are not active? A. iptables is conflicting with firewalld. B. The wrong system target is activated. C. FIREWALL_ARGS has no value assigned. D. The firewalld service is not enabled.

D. The firewalld service is not enabled.

A systems administrator is troubleshooting connectivity issues and trying to find out why a Linux server is not able to reach other servers on the same subnet it is connected to. When listing link parameters, the following is presented: # ip link list dev eth0 2: etho: <NO-CARRIER, BROADCAST, MULTICAST, UP> mtu 1500, qdisc fq_code1 state DOWN mode DEFAULT group default qlen 1000 link/ether ac:00:11:22:33:cd brd ff:ff:ff:ff:ff:ff Based on the output above, which of following is the MOST probable cause of the issue? A. The address ac:00:11:22:33:cd is not a valid Ethernet address. B. The Ethernet broadcast address should be ac:00:11:22:33:ff instead. C. The network interface eth0 is using an old kernel module. D. The network interface cable is not connected to a switch.

D. The network interface cable is not connected to a switch.

A Linux root user would like to address all processes with open sockets on a system that does not have an AppArmor profile loaded. Which command does the user issue to start? A. aa-complain B. aa-enforce C. aa-disable D. aa-unconfined

D. aa-unconfined

A system has stale Internet Protocol (IP) address to media access control (MAC) address information. What command does a user issue to resolve this problem? A. resolvectl B. dig C. iftop D. arp

D. arp

A systems technician is working on deploying several microservices to various RPM-based systems, some of which could run up to two hours. Which of the following commands will allow the technician to execute those services and continue deploying other microservices within the same terminal section? A. gedit & disown B. kill 9 %1 C. fg %1 D. bg %1 job name

D. bg %1 job name

A Linux administrator was tasked with deleting all files and directories with names that are contained in the sodelete.txt file. Which of the following commands will accomplish this task? A. xargs -f cat toDelete.txt -rm B. rm -d -r -f toDelete.txt C. cat toDelete.txt | rm -frd D. cat toDelete.txt | xargs rm -rf

D. cat toDelete.txt | xargs rm -rf

After listing the properties of a system account, a systems administrator wants to remove the expiration date of a user account. Which of the following commands will accomplish this task? A. chgrp system accountname B. passwd -s accountname C. chmod -G system account name D. chage -E -1 accountname

D. chage -E -1 accountname

An administrator attempts to rename a file on a server but receives the following error. mv: cannot move 'files/readme.txt' to 'files/readme.txt.orig': Operation not permitted. The administrator then runs a few commands and obtains the following output: $ ls -ld files/ drwxrwxrwt.1 users users 20 Sep 10 15:15 files/ $ ls -a files/ drwxrwxrwt.1 users users 20 Sep 10 15:15 - drwxr-xr-x.1 users users 32 Sep 10 15:15 .. -rw-rw-r--.1 users users 4 Sep 12 10:34 readme.txt Which of the following commands should the administrator run NEXT to allow the file to be renamed by any user? A. chgrp reet files B. chacl -R 644 files C. chown users files D. chmod -t files

D. chmod -t files

A Linux engineer is setting the sticky bit on a directory called devops with 755 file permission. Which of the following commands will accomplish this task? A. chown -s 755 devops B. chown 1755 devops C. chmod -s 755 devops D. chmod 1755 devops

D. chmod 1755 devops

A Linux administrator needs to correct the permissions of a log file on the server. Which of the following commands should be used to set filename.log permissions to -rwxr—r--. ? A. chmod 755 filename.log B. chmod 640 filename.log C. chmod 740 filename.log D. chmod 744 filename.log

D. chmod 744 filename.log

A systems administrator made some unapproved changes prior to leaving the company. The newly hired administrator has been tasked with revealing the system to a compliant state. Which of the following commands will list and remove the correspondent packages? A. dnf list and dnf remove last B. dnf remove and dnf check C. dnf info and dnf upgrade D. dnf history and dnf history undo last

D. dnf history and dnf history undo last

A newly created container has been unable to start properly, and a Linux administrator is analyzing the cause of the failure. Which of the following will allow the administrator to determine the FIRST command that is executed inside the container right after it starts? A. docker export <container_id> B. docker info <container_id> C. docker start <container_id> D. docker inspect <container_id>

D. docker inspect <container_id>

What common Linux utility is a menu-driven program that the user utilizes to create, modify, or delete partitions on a storage drive? A. blkid B. partprobe C. diskpart D. fdisk

D. fdisk

A Linux systems administrator fears that a mission-critical server is suffering from routine memory exhaustion. As a test, the administrator reboots the server, loads the typical applications, and issues which command to view available physical memory? A. cat /proc/cpuinfo B. vmstat C. top D. free

D. free

An administrator needs to make some changes in the IaC declaration templates. Which of the following commands would maintain version control? A. git clone https://github.com/comptia/linux+-.git git push origin B. git clone https://qithub.com/comptia/linux+-.git git fetch New-Branch C. git clone https://github.com/comptia/linux+-.git git status D. git clone https://github.com/comptia/linuxt+-.git git checkout -b <new-branch>

D. git clone https://github.com/comptia/linuxt+-.git git checkout -b <new-branch>

A developer new to using Git has configured global settings and created a local directory for a project. When trying to use any Git subcommands, the project is not recognized as being managed by Git. Which command should the developer issue to remedy the problem? A. git clone /dev-project B. git add {file name} C. git commit -m 'Initial commit' D. git init /dev-project

D. git init /dev-project

A Linux administrator needs to determine whether a hostname is in the DNS. Which of the following would supply the information that is needed? A. nslookup B. rsynс C. netstat D. host

D. host

A junior systems administrator has just generated public and private authentication keys for passwordless login. Which of the following files will be moved to the remote servers? A. id_dsa.pem B. id_rsa C. id_ecdsa D. id_rsa.pub

D. id_rsa.pub

Developers have requested implementation of a persistent, static route on the application server. Packets sent over the interface eth0 to 10.0.213.5/32 should be routed via 10.0.5.1. Which of the following commands should the administrator run to achieve this goal? A. route -i etho -p add 10.0.213.5 10.0.5.1 B. route modify eth0 +ipv4.routes "10.0.213.5/32 10.0.5.1" C. echo "10.0.213.5 10.0.5.1 eth0" > /proc/net/route D. ip route add 10.0.213.5/32 via 10.0.5.1 dev eth0

D. ip route add 10.0.213.5/32 via 10.0.5.1 dev eth0

A Linux administrator needs to redirect all HTTP traffic temporarily to the new proxy server 192.0.2.25 on port 3128. Which of the following commands will accomplish this task? A. iptables -t nat -D PREROUTING -p tcp --sport 80 -j DNAT - -to-destination 192.0.2.25:3128 B. iptables -t nat -A PREROUTING -p top --dport 81 -j DNAT --to-destination 192.0.2.25:3129 C. iptables -t nat -I PREROUTING -p top --sport 80 -j DNAT --to-destination 192.0.2.25:3129 D. iptables -t nat -A PREROUTING -p tcp --dport 80 -j DNAT --to-destination 192.0.2.25:3128

D. iptables -t nat -A PREROUTING -p tcp --dport 80 -j DNAT --to-destination 192.0.2.25:3128

A systems engineer is adding a new 1GB XFS filesystem that should be temporarily mounted under /ops/app. Which of the following is the correct list of commands to achieve this goal? A. pvcreate -LIG /dev/app mkfs.xfs /dev/app mount /dev/app /opt/app B. parted /dev/sdb --script mkpart primary xfs 1GB mkfs.xfs /dev/sdb mount /dev/sdb /opt/app C. lvs --create 1G --name app mkfs.xfs /dev/app /opt/app mount /dev/app /opt/app D. lvcreate -L 1G -n app app app_vq mkfs.xfs /dev/app_vg/app mount /dev/app_vg/app /opt/app

D. lvcreate -L 1G -n app app app_vq mkfs.xfs /dev/app_vg/app mount /dev/app_vg/app /opt/app

A systems administrator is tasked with preventing logins from accounts other than root, while the file /etc/nologin exists. Which of the following PAM modules will accomplish this task? A. pam_login.so B. pam_access.so C. pam_logindef.so D. pam_nologin.so

D. pam_nologin.so

A software company has created numerous custom-made processes that run across its Linux server environment. Fortunately, the company has standardized the naming of these custom processes. The company has asked a senior Linux administrator to create a report on all the custom processes and where they are running. All custom processes start with "acme_global-" with a more detailed naming scheme for the last part of the process name. What command should the administrator use to find all these processes and the corresponding names? A. Get-Process acme_global-* B. pidof acme_global- C. pgrep acme_global- D. pgrep -l acme_global-

D. pgrep -l acme_global-

A Linux system is getting an error indicating the root filesystem is full. Which of the following commands should be used by the systems administrator to resolve this issue? (Choose three.) A. df -h / B. fdisk -1 /dev/sdb C. growpart /dev/mapper/rootvg-rootlv D. pvcreate /dev/sdb E. lvresize -L +10G -r /dev/mapper/rootvg-rootlv F. lsblk /dev/sda G. parted -l /dev/mapper/rootvg-rootlv H. vgextend /dev/rootvg /dev/sdb

D. pvcreate /dev/sdb E. lvresize -L +10G -r /dev/mapper/rootvg-rootlv H. vgextend /dev/rootvg /dev/sdb

A Linux administrator wants to find out whether files from the wget package have been altered since they were installed. Which of the following commands will provide the correct information? A. rpm -i wget B. rpm -qf wget C. rpm -F wget D. rpm -V wget

D. rpm -V wget

A Linux administrator needs to remove software from the server. Which of the following RPM options should be used? A. rpm -s B. rpm -d C. rpm -q D. rpm -e

D. rpm -e

Employees in the finance department are having trouble accessing the file /opt/work/file. All IT employees can read and write the file. Systems administrator reviews the following output: admin@server: /opt/work$ ls -al file -rw-rw----+ 1 root it 4 Sep 5 17:29 file Which of the following commands would permanently fix the access issue while limiting access to IT and finance department employees? A. chattr +i file B. chown it:finance file C. chmod 666 file D. setfacl -m g:finance:rw file

D. setfacl -m g:finance:rw file

A new Linux systems administrator just generated a pair of SSH keys that should allow connection to the servers. Which of the following commands can be used to copy a key file to remote servers? (Choose two.) A. wget B. ssh-keygen C. ssh-keyscan D. ssh-copy-id E. ftpd F. scp

D. ssh-copy-id F. scp

A user generated a pair of private-public keys on a workstation. Which of the following commands will allow the user to upload the public key to a remote server and enable passwordless login? A. scp ~/.ssh/id_rsa user@server:~/ B. rsync ~ /.ssh/ user@server:~/ C. ssh-add user server D. ssh-copy-id user@server

D. ssh-copy-id user@server

A helpdesk technician is working on a user's Ubuntu laptop and notices that the clock is off by several hours because it is set in an incorrect time zone. What command can be run to place the system into a different time zone? A. localectl B. systemctl C. hostnamectl D. timedatectl

D. timedatectl

An administrator would like to update the timestamp on a text file. Which command does the administrator issue? A. ls B. cat C. tree D. touch

D. touch


संबंधित स्टडी सेट्स

Principles of Management CH. 5&6 Cate Loes

View Set

Chapter 9: What is Light? (3rd grade science)

View Set

AWS Certified Cloud Practitioner exam

View Set

Ch 20 Part 1, Ch 20 Thermodynamics

View Set